Re: [SECURITY] [DSA-2115-2] New moodle packages fix several vulnerabilities

2010-10-10 Thread post
Sehr geehrte Damen und Herren, leider ist mein Büro im Zeitraum vom 04.10. bis zum 10.10. nicht besetzt. Ihre Nachricht wird nicht weitergeleitet. Sie erreichen mich in dringenden Fällen unter der Mobilfunknummer: 0170-98 91 243 Mit freundlichen Grüßen, Florian Michel -- Heliomedia Dipl.-Infor

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Török Edwin
On Sun, 10 Oct 2010 14:05:52 -0400 Brchk05 wrote: > It's a 32-bit kernel and probably does not have PAE support enabled > so I think the mystery has been solved. Thanks to everyone for your > help. Try linux-image-2.6-686-bigmem, it probably has PAE enabled. Best regards, -_Edwin -- To UNSU

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Brchk05
It's a 32-bit kernel and probably does not have PAE support enabled so I think the mystery has been solved. Thanks to everyone for your help. -Original Message- From: Kees Cook To: Brchk05 Cc: debian-security@lists.debian.org Sent: Sun, Oct 10, 2010 1:40 pm Subject: Re: non-executa

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Kees Cook
Hi, On Sun, Oct 10, 2010 at 01:35:10PM -0400, Brchk05 wrote: > nx is in /proc/cpuinfo as a flag, though it does not appear at all in my > dmesg output. From what I can tell from the Ubuntu link you supplied, I am > assuming this means that my CPU supports nx but I do not have the right type >

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Török Edwin
On Sun, 10 Oct 2010 13:35:10 -0400 Brchk05 wrote: > Thanks, Kees. > > > nx is in /proc/cpuinfo as a flag, though it does not appear at all in > my dmesg output. From what I can tell from the Ubuntu link you > supplied, I am assuming this means that my CPU supports nx but I do > not have the ri

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Brchk05
In this case, the target of my clobbered return address is on the stack (in the stack local character buffer), so this is exactly what NX/XD is intended to prevent. -Original Message- From: Michael Loftis To: debian-security@lists.debian.org Sent: Sun, Oct 10, 2010 1:08 pm Subject:

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Brchk05
Hi Wade, Thanks for your response. Shellcode is native machine code. It is not shell script code. See http://en.wikipedia.org/wiki/Shellcode -Original Message- From: Wade Richards To: Brchk05 Cc: debian-security@lists.debian.org Sent: Sun, Oct 10, 2010 11:59 am Subject: Re: non

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Brchk05
Thanks, Kees. nx is in /proc/cpuinfo as a flag, though it does not appear at all in my dmesg output. From what I can tell from the Ubuntu link you supplied, I am assuming this means that my CPU supports nx but I do not have the right type of kernel, i.e., one that uses PAE addressing, to supp

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Nico Golde
Hi, * Wade Richards [2010-10-10 19:08]: > The noexecstack option has no affect on shell code or any other interpreted > language. It only prevents native code (aka machine code) from executing. errm http://en.wikipedia.org/wiki/Shellcode -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.d

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Michael Loftis
--On Sunday, October 10, 2010 9:53 AM -0400 Brchk05 wrote: I am running Debian 2.6.26-21lenny4 and I am puzzled by an issue with the enforcement of page permissions. I have written a simple program with a basic buffer overflow and compiled two versions using gcc: one with -z execstack and

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Wade Richards
The noexecstack option has no affect on shell code or any other interpreted language. It only prevents native code (aka machine code) from executing. --- Wade On 2010-10-10, at 6:53, Brchk05 wrote: > > I am running Debian 2.6.26-21lenny4 and I am puzzled by an issue with the > enforce

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Kees Cook
Hi, On Sun, Oct 10, 2010 at 09:53:40AM -0400, Brchk05 wrote: > However, I am able to inject and execute shellcode from a stack local > character buffer in both versions. Is there another system option I am > unaware of that affects enforcement? Is enforcement not supported for my > system ver

non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Brchk05
I am running Debian 2.6.26-21lenny4 and I am puzzled by an issue with the enforcement of page permissions. I have written a simple program with a basic buffer overflow and compiled two versions using gcc: one with -z execstack and another with -z noexecstack. So, to verify that the optio